Please use this identifier to cite or link to this item:
https://doi.org/10.1038/s41598-021-84291-w
DC Field | Value | |
---|---|---|
dc.title | Traffic networks are vulnerable to disinformation attacks | |
dc.contributor.author | Waniek, Marcin | |
dc.contributor.author | Raman, Gururaghav | |
dc.contributor.author | AlShebli, Bedoor | |
dc.contributor.author | Peng, Jimmy Chih-Hsien | |
dc.contributor.author | Rahwan, Talal | |
dc.date.accessioned | 2022-10-11T07:49:21Z | |
dc.date.available | 2022-10-11T07:49:21Z | |
dc.date.issued | 2021-03-05 | |
dc.identifier.citation | Waniek, Marcin, Raman, Gururaghav, AlShebli, Bedoor, Peng, Jimmy Chih-Hsien, Rahwan, Talal (2021-03-05). Traffic networks are vulnerable to disinformation attacks. Scientific Reports 11 (1) : 5329. ScholarBank@NUS Repository. https://doi.org/10.1038/s41598-021-84291-w | |
dc.identifier.issn | 2045-2322 | |
dc.identifier.uri | https://scholarbank.nus.edu.sg/handle/10635/231961 | |
dc.description.abstract | Disinformation continues to raise concerns due to its increasing threat to society. Nevertheless, a threat of a disinformation-based attack on critical infrastructure is often overlooked. Here, we consider urban traffic networks and focus on fake information that manipulates drivers’ decisions to create congestion at a city scale. Specifically, we consider two complementary scenarios, one where drivers are persuaded to move towards a given location, and another where they are persuaded to move away from it. We study the optimization problem faced by the adversary when choosing which streets to target to maximize disruption. We prove that finding an optimal solution is computationally intractable, implying that the adversary has no choice but to settle for suboptimal heuristics. We analyze one such heuristic, and compare the cases when targets are spread across the city of Chicago vs. concentrated in its business district. Surprisingly, the latter results in more far-reaching disruption, with its impact felt as far as 2 km from the closest target. Our findings demonstrate that vulnerabilities in critical infrastructure may arise not only from hardware and software, but also from behavioral manipulation. © 2021, The Author(s). | |
dc.publisher | Nature Research | |
dc.rights | Attribution 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
dc.source | Scopus OA2021 | |
dc.type | Article | |
dc.contributor.department | ELECTRICAL AND COMPUTER ENGINEERING | |
dc.description.doi | 10.1038/s41598-021-84291-w | |
dc.description.sourcetitle | Scientific Reports | |
dc.description.volume | 11 | |
dc.description.issue | 1 | |
dc.description.page | 5329 | |
Appears in Collections: | Elements Staff Publications |
Show simple item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
10_1038_s41598-021-84291-w.pdf | 3.59 MB | Adobe PDF | OPEN | None | View/Download |
This item is licensed under a Creative Commons License